full screen background image

Archives post

Sonar δωρεάν εργαλείο της Microsoft για ανάλυση ιστοσελίδων

Αναρωτιέστε αν η ιστοσελίδα που έχετε είναι σωστά κωδικοποιημένη; Η ομάδα...

Exitmap – A Fast and Modular Scanner for TOR Exit Relays

  Exitmap is a fast and modular Python-based scanner for Tor exit relays. Exitmap modules implement tasks that are run over (a subset...

Nikto v2.1.6 – Web Server Scanner

  Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items,...

MSSQL Penetration Testing with Metasploit

Requirement Attacker: kali Linux (NMAP) Target: Windows 10 (MS SQL Server) Let’s start!! MSSQL Brute force Attack This module simply...

Pentest-Tools-Auto-Installer – A Simple Tool For Installing Pentest Tools And Forensic Tools On Debian / Ubuntu Based OS

  A Simple tool for installing pentest tools and forensic tools on Debian / Ubuntu Based OS Tested on Linux Mint And Kali Linux I Want...

WordCamp Athens 2017 Σάββατο 09 Δεκεμβρίου

WordCamp Athens 2017: Περίπου το 28% των websites που διαβάζει κανείς καθημερινά, έχουν...

SQLiv – Massive SQL Injection Vulnerability Scanner

Massive SQL injection vulnerability scanner. Features multiple domain scanning with SQL injection dork by Bing, Google, or Yahoo targetted...

sqlmate – Tool which will do what you always expected from SQLmap

There are some features that we think SQLMap should have. Like finding admin panel of the target, better hash cracking etc. If you think...

Comprehensive Guide to Sniffing

ARP Protocol The Address Resolution Protocol (ARP) is a communications protocol used for discovering the link layer address associated with...

Autopsy 4.5.0 release: Open source forensics tool

Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by...

Quick Wins For Improving Performance And Security Of Your Website

Many companies try to create a great experience for customers. But few are willing to make the changes required to deliver on that promise....

How To Keep Yourself Safe From Latest Data Breaches

Recently, many of the HBO’s shows were leaked online. Earlier, the Wanna Cry ransomeware affected the people across the globe....

Silent minergate miner reverse – Backdoored

I found some ”free” software on the internet backdoored with that Silent Minergate, so this time i downloaded the Minergate to...

OWASP ZAP 2.6.0 – Penetration Testing Tool for Testing Web Applications

  The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of...

Exploit Pack – Penetration Testing Framework

  Exploit Pack has been designed by an experienced team of software developers and exploit writers to automate processes so...

Security+ Domain #6: Cryptography

Cryptography falls into the sixth and last domain of CompTIA’s Security+ exam (SYO-401) and contributes 12% to the exam score. The...

Security+ Domain #5: Access control and Identity Management

Introduction The “access control and identity management” domain is aimed at teaching and testing on industry-accepted practices, such...

Security+ Domain #4: Application, Data, and Host Security

Application, data, and host Security falls into the fourth domain of CompTIA’s Security+ exam (SYO-401) and contributes 15% to the exam...

Security+ Domain #3: Threats and Vulnerabilities

Introduction Threats and vulnerabilities fall into the third domain of CompTIA’s Security+ exam (SYO-401) and contribute 20% to the exam...

Security+ Domain #2: Compliance and Operational Security

Compliance and operations security falls into the second domain of CompTIA’s Security+ exam (SYO-401) and contributes 18% to the exam...

Security+ Domain #1: Network Security

Introduction Network security falls into the first domain of CompTIA’s Security+ exam (SYO-401) and contributes 20% to the exam score....

nsearch: find script into the nse database

Nmap Scripting Engine Search Description Nsearch is a tool that helps you to find scripts that are used by nmap ( nse ), you can search the...

MISP – Malware Information Sharing Platform & Threat Sharing

MISP – Malware Information Sharing Platform and Threat Sharing MISP, Malware Information Sharing Platform, and Threat Sharing is an open...

CSRFT – Cross Site Request Forgeries (Exploitation) Toolkit

CSRFT – Cross Site Request Forgeries (Exploitation) Toolkit Introduction Description This project has been developed to exploit CSRF Web...

manticore v0.1.5 release: Dynamic binary analysis tool

Manticore is a prototyping tool for dynamic binary analysis, with support for symbolic execution, taint analysis, and binary...

Security Monkey: monitors AWS and GCP accounts for policy changes and alerts on insecure configurations

Security Monkey   Security Monkey monitors your AWS and GCP accounts for policy changes and alerts on insecure configurations. It...

Hack the H.A.S.T.E. VM Challenge

Hello friends! Today we are going to take another CTF challenge known as ‘H.A.S.T.E.’. The credit for making this vm machine goes to...

Hack the RickdiculouslyEasy VM (CTF Challenge)

Hello friends! Today we are going to take another CTF challenge known as RickdiculouslyEasy. The credit for making this vm machine goes to...

Hack the BTRSys1 VM (Boot2Root Challenge)

BTRSys v1 is another lab by ‘ismailonderkaya’ in the series BTRSys. This lab helps you sharpen your skills as a pentester. It is a must...

reflector – Burp plugin able to find reflected XSS on page in real-time while browsing on site

Burp Suite extension is able to find reflected XSS on page in real-time while browsing on web-site and include some features as:...